Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identification system based on keystroke rhythm and identification method thereof

A user identification and identification module technology, applied in the field of user identification, can solve the problems of increasing difficulty and requirements of user identification, inability to prevent illegal operations of operators in time, and inability to perceive changes in operator identification, and achieve enhanced resistance The ability of illegal intrusion, the reduction of access thresholds, and the effect of improving user experience

Inactive Publication Date: 2017-09-01
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the user has logged into the system and obtained the corresponding authority of the system, the system regards the current operator as a legitimate user, cannot perceive the change of the operator's identity, and cannot prevent the current operator's illegal operation in time, which poses a major threat to system security
[0005] To sum up, the difficulty and requirements of user identification are also increasing, and the simple password identification scheme can no longer meet the current technical requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification system based on keystroke rhythm and identification method thereof
  • User identification system based on keystroke rhythm and identification method thereof
  • User identification system based on keystroke rhythm and identification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The examples are described in detail below in conjunction with the accompanying drawings.

[0046] The present invention proposes a user identification system based on the keystroke rhythm of the user. After the user logs in, the system will continuously collect and analyze all the keystroke operation data of the user during the login period, and perform confidence detection according to the user feature database. If the user's confidence is lower than the preset early warning threshold, the system will The third-party business system will be notified to re-verify the user's identity, and at the same time, the user's behavior will be controlled according to the verification result.

[0047] figure 1 Shown is a schematic diagram of integration between this system and a third-party business system. The user identification system integrates with third-party business systems in a plug-and-play modular form. The user identification system collects the user's keystroke ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of user identification technology, and particularly relates to a user identification system based on keystroke rhythms and an identification method thereof. The method comprises the following steps: acquiring and analyzing all keystroke rhythms after a user logs into a system to obtain the confidence degree of the current login user, and judging whether the identity of the current login user is legal according to the confidence degree of the user; and meanwhile, performing continuous identity verification for the user to judge whether the current user is a legal user, and performing permission verification for the user again when the confidence degree of the user is lower than a preset early warning threshold. According to the user identification system based on the keystroke rhythms and the identification method thereof disclosed by the invention, the identity of the user can be identified through keystroke rhythm data of the user, the user does not need to carry out other authentication behaviors during identification, the user experience can be improved through the fully transparent identification of the user, the operations of the user cannot be affected, a continuous identification scheme is adopted to perform uninterrupted identification and authentication for the identity of the user, and thus the ability of the system to resist illegal intrusions can be enhanced, and the security of the system can be effectively improved.

Description

technical field [0001] The invention belongs to the technical field of user identification, and in particular relates to a keystroke rhythm-based user identification system and an identification method thereof. Background technique [0002] User identification technology is an important security measure in various computer systems. The accuracy of user identification is directly related to the security of computer systems. Nowadays, a variety of user identification technologies have been developed for the purpose of passing Various means can accurately identify the current user identity. The initial user identification scheme is a password-based single-factor identification scheme, which requires the user to enter the corresponding password or username / password, and judges the current user by checking the value entered by the user. With the continuous development of cracking technology and the improvement of computer performance, most identification systems based on passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/32
CPCG06F21/32H04L63/0861H04L63/10
Inventor 张晓良周铁峰吴克河张五霞张建安
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products